Preferred Language
Articles
/
jcofarts-470
The effectiveness of the constructivist learning model in acquiring the Institute of Fine Arts' students of artistic analysis skills: اخلاص عبد القادر طاهر
...Show More Authors

The constructivist learning model is one of the models of constructivist theory in learning, as it generally emphasizes the active role of the learner during learning, in addition to that the intellectual and actual participation in the various activities to help students gain the skills of analyzing artistic works. The current research aims to know the effectiveness of the constructivist learning model in the acquisition of the skills of the Institute of Fine Arts for the skills of (technical work analysis). To achieve the goal, the researcher formulated the following hypothesis: There are no statistically significant differences between the average scores of the experimental group students in the skill test for analyzing artworks before and after.
The theoretical framework included the concept of constructivism and the structural model and its stages, as the researcher presented the taste and analysis of technical work and has adopted in its procedures the experimental one-group approach with two tests (pre-dimensional), as it is the most appropriate approach to achieve the goal of the current research. The research community consisted of male (2264) students of institutes of fine arts for the academic year 2019-2020. The basic research sample chose: The Institute of Fine Arts - the first Rusafa, numbering (30) students, where the choice was made for the fifth stage students - Design Department, after conducting the simple random lottery and conducted the pre-skill test to determine the levels of students in the artistic taste analysis Technical works and comparing its bicycles to the post-skill test scores. The researcher also prepared a form to evaluate the skill performance of students in their implementation of the requirements of the skill test consisted of (10) paragraphs for which he specified a five-point scale, and thus the total score obtained by the student in his analysis of the technical work is equal to (50) stairs . It was presented to the experts, and in light of their observations, it became usable and after honesty and consistency were achieved for them, it was applied to the basic sample of the research. Statistical methods were used; the researcher used the statistical bag (spss) to process the data. After applying the skill test, the results indicated the appearance of a difference in the average score of the experimental group between the pre and posttests, and the direction of this difference referred to the post skill test, due to the sequence followed in students' learning and their acquisition of technical analysis skills according to the constructive learning model.
Based on the results that have emerged, the researcher concludes the following:
1- The ability of the constructive learning model to acquire cognitive information in the technical taste subject for fifth stage students.
2- The emergence of capabilities and capabilities of the fifth stage students in the analysis of technical work after they have acquired the steps of analysis according to the analytical premises of the structural approach.
The researcher suggested conducting the following studies:
1- Conducting a comparative study of the constructive learning model and other forms of learning to determine which is more effective in acquiring technical work analysis skills.
2- Carrying out similar studies to the current study, according to other modern monetary approaches, such as semiotic, deliberative, and deconstructive.
Key words: effectiveness - constructive learning model - acquisition - skill - analysis - technical work.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Power System Stabilizer PSS4B Model for Iraqi National Grid using PSS/E Software
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The results showed

... Show More
Crossref (7)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (119)
Crossref (98)
Scopus Clarivate Crossref
Publication Date
Sat Dec 21 2024
Journal Name
Edelweiss Applied Science And Technology
Using count regression models to investigate the most important economic factors affecting divorce in Iraq
...Show More Authors

The two most popular models inwell-known count regression models are Poisson and negative binomial regression models. Poisson regression is a generalized linear model form of regression analysis used to model count data and contingency tables. Poisson regression assumes the response variable Y has a Poisson distribution, and assumes the logarithm of its expected value can be modeled by a linear combination of unknown parameters. Negative binomial regression is similar to regular multiple regression except that the dependent (Y) variables an observed count that follows the negative binomial distribution. This research studies some factors affecting divorce using Poisson and negative binomial regression models. The factors are unemplo

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Belief about Medications Among Type 2 Diabetic Patients Attending the National Diabetes Center in Iraq.
...Show More Authors

Diabetes mellitus is a common health problem worldwide counting about 1.2 million cases in Iraq in 2015. Taking in account of the patient’s beliefs about the prescribed medication had been reported to be one of the most important factors that affects adherence where holding positive beliefs about medications is a prerequisite for intentional adherence. The aim of the current study was to investigate and assess beliefs about medicines among type 2 diabetic patients and to determine possible association between this belief and glycemic control as well as some patient-specific factors. This study is a cross-sectional study carried out on 380 (mean age 56.58± 10.06 years) already diagnosed T2DM patients who attended the National Diabetes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
International Journal Of Human Rights In Healthcare
Organizational health between theory and practice field research in the General Company for Petroleum Products
...Show More Authors
Purpose

This study aims to measure the basic foundations of organizational health in the General Company for Food Products and to indicate the extent of its presence or not within the company under investigation.

Design/methodology/approach

This research was completed using a descriptive and analytical approach using a sample of 97 employees from the General Company for Petroleum Products. Calculating the arithmetic mean, standard deviation, coefficient of variation, and confirmatory factor analysis are all part of the data processing process.

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
North American Journal Of Medical Sciences
Urinary tract infections caused by staphylococcus aureus DNA in comparison to the candida albicans DNA
...Show More Authors

Background: Bacterial DNA released upon bacterial autolysis or killed by antibiotics, hence, many inflammatogenic reactions will be established leading to serious tissue damage. Aim: the present work aimed to elucidate the histopathological changes caused by prokaryotic (bacterial) DNA and eukaryotic (candidal) DNA. Materials and methods: twenty one Staphylococcus aureus and 36 Candida albicans isolates were isolated from UTI patients. Viable cells and DNA of the highest antibiotic sensitive isolates were injected, intraurethraly, in mice. Results were evaluated via histopathological examination. Results: Mildest reactions were obtained from mice challenged with viable C. albicans compared with those challenged with viable S. aureus. Dos

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Industrial Engineering & Management Systems
Optimizing the Complex Systems Reliability Using Mixed Strategy in Ultra-fast Gas Turbine Protection System
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Animal Biotechnology
A novel deleterious oxytocin variant is associated with the lower twinning ratio in Awassi ewes
...Show More Authors

This study aimed to assess the possible association of oxytocin (OXT) gene with reproductive traits in two groups of Awassi ewes that differ in their reproductive potentials. Sheep were genotyped using PCR—single-stranded conformation polymorphism approach. Three genotypes were detected in exon 2, CC, CA, and AA, and a novel SNP was identified with a missense effect on oxytocin (c.188C > A → p.Arg55Leu). A significant (p < 0.01) association of p.Arg55Leu with the twinning rate was found as ewes with AA and CA genotypes exhibited, respectively a lower twinning ratio than those with the wild-type CC genotype. The deleterious impact of p.Arg55Leu was demonstrated by all in silico tools that were utilized to assess the effect of this varian

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref